How to Launch a Secure Cloud Initiative: NASA s Jet Propulsion Laboratory
|
|
|
- Reginald Hardy
- 10 years ago
- Views:
Transcription
1 How to Launch a Secure Cloud Initiative: NASA s Jet Propulsion Laboratory Tomas Soderstrom CTO, Jet Propulsion Laboratory, NASA Eric Chabrow Executive Editor, Information Security Media Group Session ID: CLD-203 Insert presenter logo here on slide master. See hidden slide 4 for directions Session Classification: Advanced
2 Agenda Trends from Information Security Media Group s 2012 Cloud Computing Security Survey. Case study of NASA s Jet Propulsion Laboratory successful initiatives to plan, pilot and deploy cloud computing offerings. Discussion between the presenters and RSA attendees on presentation. 2
3 3
4 2012 Cloud Security Survey Objectives Define the cloud. Gauge organizations' top cloud security concerns. Identify applications/services users feel comfortable/uncomfortable placing on the cloud. Determine user/provider security responsibilities.
5 2012 Cloud Computing Security Survey Insert presenter logo here on slide master. See hidden slide 4 for directions 5
6 Who Did We Survey Respondents from 17 sectors from around the globe IT Security Responsibilities 64% Determine strategy 52% Establish priorities 48% Manage budgets
7 Understanding Respondents How secure do you view your and your cloud provider s IT? (those answering secure, very secure) Own: 62% Cloud provider: 40%
8 Understanding Respondents Services deployed or soon to be deployed on cloud: Application hosting / messaging 30% 33% Application development / testing Data storage Collaboration software 26% 26% 24% 0% 5% 10% 15% 20% 25% 30% 35%
9 Cloud Jitters What s your greatest reservation about cloud computing? Data protection / data loss Enforcing security policies Audit trail Meeting regulatory requirements 7% 14% 10% 39% 0% 10% 20% 30% 40% 50%
10 Cloud Jitters What information do you consider too risky to put on a private cloud? Intellectual property / trade secrets: 49% Credit card: 49% Financial: 48% State/government secrets: 47% Corporate proprietary/sensitive information: 42% Health: 41% Customer records: 39% PPI: 39%
11 Moving onto the Cloud What is the primary factor that goes into deciding whether to deploy cloud computing? Security 30% Costs 24% Ability to share data among different resources 12% Resources 9% Privacy 6% 0% 5% 10% 15% 20% 25% 30% 35%
12 Moving onto the Cloud Do you employ third-party attestation? Yes: 64% No: 36%
13 Moving onto the Cloud 78% The number of respondents that say its important or very important that their cloud providers servers to be situated in the users country.
14 Moving onto the Cloud Would you move critical business systems to the cloud? No: 33% Perhaps, but not within 12 months: 31% Yes, one or more critical business systems on the cloud: 18% Yes, we plan to move one or more critical business systems to cloud within year: 18%
15 The Takeaway Organizations approach to cloud computing remains immature. Jitters exist about the cloud as a secure computing environment remains. Employing the cloud and making it secure is the domain of the IT and IT security organization. Despite anxieties, the cloud is happening and IT security professionals recognize they must find ways to make it secure.
16 Survey Lives On The 2012 Cloud Security Survey remains open. If you haven t yet, please take the survey at
17 Ready for Launch The 2012 Cloud Security Survey raises topics JPL s CTO Tom Soderstrom is about to address, including: Learning from existing, commodity cloud initiatives to better deal with providers. Surmounting security anxieties cloud computing presents. Turning the reality that the cloud is becoming a major computing platform into a tool you can employ securely.
18 Beyond the Pervasive Cloud: Lessons and the Future Tom Soderstrom IT Chief Technology Officer and Khawaja Shams Missions Cloud Expert NASA Jet Propulsion Laboratory Copyright 2011 California Institute of Technology. Government sponsorship acknowledged
19 JPL is part of both NASA and Caltech JPL is a Federally Funded Research and Development Center (FFRDC) Managed by CalTech for NASA NASA s lead center for robotic exploration of the solar system. Have 19 spacecraft and 9 instruments across the solar system and beyond $1.7B contract per year, ~ 5,000 employees; 177 acre facility located in Pasadena, CA, with 670K sq.ft of office space and 900K sq.ft. of labs Manages worldwide Deep Space Network 3 Locations - Goldstone CA, Madrid Spain, Canberra Australia Spacecraft Command & Control - Recording scientific data 50+ years experience in spacecraft design, production, operation JPL spacecraft have visited all planets in our solar system except Pluto! 19
20 Near Term Mars & Solar System Exploration Events EPOXI Comet Flyby Nov Stardust- NExT Comet Flyby Feb Aquarius Jun Juno Aug Dawn Vesta Arrival Aug (Ceres, February 2015) GRAIL Sep Mars Science Laboratory Nov / Aug NuSTAR Feb. 2012
21 21
22 22 Flicker by WSDOT
23 Credit: Eric Johnson
24 Industry Trends for the next IT Decade (from JPL s Office of the CIO) Work with anyone, from anywhere, with any data, using any device, at any time Immersive Visualization and Interaction You ve Got Apps Eco Friendliest Extreme Collaboration Made Simple Human Behavior Consumer Driven IT Refocused Cyber Security Big Data The Pervasive Cloud Transforming IT into Innovating Together
25 JPL s approach to Cloud Computing Go from this
26 JPL s approach to Cloud Computing to this and this Replace Every Procurement Screen with a Provisioning Screen. Jim Rinaldi JPL CIO John Callas, JPL
27 A few new concepts emerged 1. Cloud Application Suitability Model (CASM) 3. Cloud Readiness Levels (CRL) (Institution, Apps, Dev) 2. Wheel of Security Public and Non-Sensitive data can be accessed in the Cloud today NASA Technology Readiness Level 4. Cloud Oriented Architecture (CLOA)
28 Overcoming Barriers to Cloud Computing Keep it real Focus on real business problems Early hands-on prototypes in every promising cloud Avoid analysis paralysis, but be safe Pro-active partnering Educate, communicate, influence, elaborate Keep it real
29 Cloud Computing is helping JPL today and beyond Microsoft
30
31
32 32
33 Well, Skywalker, ignore or resist the Force at your own peril
34 InSAR Processing Big Data, Big Processing, Big Science! INSAR Processing 4 hours - 80 machines GB 4 TB Processing Cost: $256!
35 5 Giga-pixels 5 SWF EC2 S3 SimpleDB CloudWatch IAMs ELB A9?
36 Consumer Driven IT Impacts Always On Easy Anyone Anytime Anywhere Any device Any content Any form factor In Context 3D In the air Reading Connected Lifestyle Power Social Data Gaming Video Sound Wireless DDSS Drag + Drop + Sync + Share
37 The Consumer Cloud is already here
38 Courtesy Ken & Michelle Dyball/Getty Images
39 But how on earth can we make it secure?
40 Trend: Refocused Cyber Security Trends: Less control + increased regulation + more attacks + increased awareness Need faster solutions despite new challenges: Cloud Computing, Mobility, Personal devices, Collaboration, Social Media, International hacking, Increased partnering Cyber security goes from afterthought to front: The buck starts here Protect by enabling Partner with IT Security on all projects 40
41 SEPARATION OF CONCERN
42 COVERING OUR ASSETS ON CLOUD
43 Virtual private cloud
44 SECURED UPLINK PLANNING
45 LMMP The future of computing
46 So, what s next?
47 JPL Cloud Strategy: What s next for JPL and Clouds Applied Cloud First strategy Partner in the Cloud Cloud enables mobile benefits Specialized Clouds become the OS Evolve Cloud Oriented Architecture (CLOA) and Cloud Application Suitability Model (CASM) Innovating Together is the norm Make it and IT compelling Take full advantage of the rising tide of the Pervasive Cloud Keep it real
48 Recommendations for how to get started with cloud Get started now and learn with low sensitivity data Focus on new capabilities Prototype under the radar screen Communicate it as a business initiative (ROA) Partner with everyone including cross-functional leaders Use the 3-floor elevator test Expect license agreements to take time Look at the full risk vs. reward Innovate Together and Keep it real
49 Our New business DANCING ROBOTS
50 Surf the rising tide of Cloud Computing in your business Insert presenter logo here on slide master. See hidden slide 4 for directions
51 Thanks for listening Insert presenter logo here on slide master. See hidden slide 4 for directions 51
Making IT Rain with Cloud Computing. Tom Soderstrom IT Chief Technology Officer and. Khawaja Shams Missions Cloud Expert
Making IT Rain with Cloud Computing Tom Soderstrom IT Chief Technology Officer and Khawaja Shams Missions Cloud Expert Jet Propulsion Laboratory, California Institute of Technology. One must learn by doing
JPL ANOMALY ISSUES. Henry B. Garrett Jet Propulsion Laboratory California Institute of Technology Pasadena, CA, 91109
JPL ANOMALY ISSUES Henry B. Garrett Pasadena, CA, 91109 Space Weather Anomaly Concerns for JPL Robotic Mission AGENDA Overview of Space Weather Anomalies on JPL Missions Space Weather Products used by
Cloud Computing @ JPL Science Data Systems
Cloud Computing @ JPL Science Data Systems Emily Law, GSAW 2011 Outline Science Data Systems (SDS) Space & Earth SDSs SDS Common Architecture Components Key Components using Cloud Computing Use Case 1:
The cloud - ULTIMATE GAME CHANGER ===========================================
The cloud - ULTIMATE GAME CHANGER =========================================== When it comes to emerging technologies, there is one word that has drawn more controversy than others: The Cloud. With cloud
APPROACHABLE ANALYTICS MAKING SENSE OF DATA
APPROACHABLE ANALYTICS MAKING SENSE OF DATA AGENDA SAS DELIVERS PROVEN SOLUTIONS THAT DRIVE INNOVATION AND IMPROVE PERFORMANCE. About SAS SAS Business Analytics Framework Approachable Analytics SAS for
Federal Cloud Computing Initiative Overview
Federal Cloud Computing Initiative Overview Program Status To support the Federal Cloud Computing Direction and Deployment Approach, the ITI Line of Business PMO has been refocused as the Cloud Computing
How Perforce Can Help with Sarbanes-Oxley Compliance
How Perforce Can Help with Sarbanes-Oxley Compliance C. Thomas Tyler Chief Technology Officer, The Go To Group, Inc. In collaboration with Perforce Software Perforce and Sarbanes-Oxley The Sarbanes-Oxley
Cloud Computing: What IT Professionals Need to Know
Learning Cloud Computing: What IT Professionals Need to Know Cloud computing promises new career opportunities for IT professionals. In many cases, existing core skill sets transfer directly to cloud technologies.
Training Employees to Recognise & Avoid Advanced Threats
Training Employees to Recognise & Avoid Advanced Threats Joe Ferrara, President & CEO, Wombat Security Technologies Rashmi Knowles, Chief Security Architect EMEA, RSA The Security Division of EMC Session
Automated Spacecraft Scheduling The ASTER Example
Automated Spacecraft Scheduling The ASTER Example Ron Cohen [email protected] Ground System Architectures Workshop 2002 Jet Propulsion Laboratory The Concept Scheduling by software instead of
Mobile and BYOD Strategy
Mobile and BYOD Strategy Bring Your Own Device Danairat T. Certified Java Programmer, TOGAF Silver [email protected], +66-81-559-1446 1 Agenda Introduction to Mobile Technology Mobile Computing Bring
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas
Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture
Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture 2 Data Security and Privacy Principles for IBM SaaS Contents 2 Introduction
Information Technology Management Marshall Space Flight Center
Information Technology Management Marshall Space Flight Center Jonathan Pettus January 31, 2013 NASA Around the Country Glenn Research Center Aeronautics and Spacecraft Technology Cleveland, Ohio Ames
ACTIVE MICROSOFT CERTIFICATIONS:
Last Activity Recorded : May 30, 2014 Microsoft Certification ID : 375009 SUSANNE SCHNEIDER KAISERSTRASSE 53 REUTLINGEN, 72764 DE [email protected] *Charter- Certification that was achieved
The NREN s core activities are in providing network and associated services to its user community that usually comprises:
3 NREN and its Users The NREN s core activities are in providing network and associated services to its user community that usually comprises: Higher education institutions and possibly other levels of
Measuring the Maturity of Robotic Planetary Mission Concepts II
SpaceOps 2010 ConferenceDelivering on the DreamHosted by NASA Mars 25-30 April 2010, Huntsville, Alabama AIAA 2010-2034 Measuring the Maturity of Robotic Planetary Mission Concepts
Threat Intelligence Pty Ltd [email protected] 1300 809 437. Specialist Security Training Catalogue
Threat Intelligence Pty Ltd [email protected] 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?
Course Syllabus. LUCIO CASSIA Professor of Strategic and Global Management STRATEGIC MANAGEMENT
LUCIO CASSIA Professor of Strategic and Global Management Chairman of CYFE Research Center for Young and Family Enterprise University of Bergamo STRATEGIC MANAGEMENT Course Syllabus Lesson STR T00 - Course
ABSTRACT. I. Introduction. BI software allows the analyst to create automated tools (or queries) that will:
SpaceOps 2010 ConferenceDelivering on the DreamHosted by NASA Mars 25-30 April 2010, Huntsville, Alabama AIAA 2010-2113 Use of Business Intelligence Tools in the DSN Joseph I.
Securely Outsourcing to the Cloud: Five Key Questions to Ask
WHITE PAPER JULY 2014 Securely Outsourcing to the Cloud: Five Key Questions to Ask Russell Miller Tyson Whitten CA Technologies, Security Management 2 WHITE PAPER: SECURELY OUTSOURCING TO THE CLOUD: FIVE
Dawn - Overview, Science Objectives, Mission Progress. Hap McSween For PI Chris Russell
Dawn - Overview, Science Objectives, Mission Progress Hap McSween For PI Chris Russell Presentation to Decadal Survey Primitive Bodies Panel, Washington, DC, Sep 2009 Spacecraft configuration, assembly
How To Improve The Defense Communications System
Briefing to the AFCEA International Cyber Symposium 26 June 2013 Lt Gen Ronnie D. Hawkins, Jr. Director, Defense Information Systems Agency 1 1 UNCLASSIFIED Organizational Changes Command Staff Financial
Solar System Observations contains two components: Planetary Astronomy and Near Earth Object Observations.
C.6 SOLAR SYSTEM OBSERVATIONS 1. Scope of Program Solar System Observations supports both ground-based astronomical observations and suborbital investigations of our Solar System involving sounding rockets
Privilege Gone Wild: The State of Privileged Account Management in 2015
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
Role of Cloud Computing in Education
Role of Cloud Computing in Education Kiran Yadav Assistant Professor, Dept. of Computer Science. Govt. College for Girls, Gurgaon, India ABSTRACT: Education plays an important role in maintaining the economic
The Cloud Balancing Act for IT: Between Promise and Peril
The Cloud Balancing Act for IT: Between Promise and Peril Table of Contents EXECUTIVE SUMMARY...2 ONBOARDING CLOUD SERVICES...3 SYSTEMS OF RECORD: THE NEXT WAVE OF CLOUD ADOPTION...6 A CULTURE OF COMPLIANCE
Cisco & Big Data Security
Cisco & Big Data Security 巨 量 資 料 的 傳 輸 保 護 Joey Kuo Borderless Networks Manager [email protected] The any-to-any world and the Internet of Everything is an evolution in connectivity and collaboration that
Accenture Cyber Security Transformation. October 2015
Accenture Cyber Security Transformation October 2015 Today s Presenter Antti Ropponen, Nordic Cyber Defense Domain Lead Accenture Nordics Antti is a leading consultant in Accenture's security consulting
Maximize strategic flexibility by building an open hybrid cloud Gordon Haff
red hat open hybrid cloud Whitepaper Maximize strategic flexibility by building an open hybrid cloud Gordon Haff EXECUTIVE SUMMARY Choosing how to build a cloud is perhaps the biggest strategic decision
Cloud Services The Path Forward. Mr. Stan Kaczmarczyk Acting Director - Strategic Solutions and Security Services FAS/ ITS, GSA
Cloud Services The Path Forward Mr. Stan Kaczmarczyk Acting Director - Strategic Solutions and Security Services FAS/ ITS, GSA November 1, 2012 Agenda Integrated Technology Services (ITS) Cloud Acquisition
The NREN cloud strategy should be aligned with the European and national policies, but also with the strategies of the member institutions.
4 External influences PESTLE Analysis A PESTLE analysis is a useful tool to support the investigation and decision process relating to cloud services. PESTLE in general covers Political, Economic, Social,
6 Things To Think About Before Implementing BYOD
6 Things To Think About Before Implementing BYOD Kimber Spradlin, CISA, CISSP 2012 IBM Corporation Mobile Devices: Unique Management & Security Challenges Mobile devices are shared more often Mobile devices
WhitePaper. Private Cloud Computing Essentials
Private Cloud Computing Essentials The 2X Private Cloud Computing Essentials This white paper contains a brief guide to Private Cloud Computing. Contents Introduction.... 3 About Private Cloud Computing....
GOVERNMENT USE OF MOBILE TECHNOLOGY
GOVERNMENT USE OF MOBILE TECHNOLOGY Barriers, Opportunities, and Gap Analysis DECEMBER 2012 Product of the Digital Services Advisory Group and Federal Chief Information Officers Council Contents Introduction...
Making the Internet Business-Ready
Making the Internet Business-Ready If you ve ever shopped online, downloaded music, watched a web video or connected to work remotely, you ve probably used Akamai. Our solutions help to deliver the best
How To Get A Certificate From Ms.Net For A Server Server
Last Activity Recorded : December 19, 2014 Microsoft Certification ID : 2665612 MARC GROTE Wittorfer Strasse 4 Bardowick, Lower Saxony 21357 DE [email protected] ACTIVE MICROSOFT CERTIFICATIONS:
NASA Office of Inspector General
NASA Office of Inspector General National Aeronautics and Space Administration Office of Audits NASA S MANAGEMENT OF THE DEEP SPACE NETWORK March 26, 2015 Report No. IG-15-013 National Aeronautics and
Solving the Security Puzzle
Solving the Security Puzzle How Government Agencies Can Mitigate Today s Threats Abstract The federal government is in the midst of a massive IT revolution. The rapid adoption of mobile, cloud and Big
Anatomy of an Enterprise Software Delivery Project
Chapter 2 Anatomy of an Enterprise Software Delivery Project Chapter Summary I present an example of a typical enterprise software delivery project. I examine its key characteristics and analyze specific
Another Giant Leap. for Mankind. Lesson Development
Lesson Development Apollo capsule (Image: NASA) Earth (Image: NASA) Instructional Objectives Students will decompose a geometric shape into smaller parts; apply the appropriate formulas for various geometric
Building a Roadmap to Robust Identity and Access Management
Building a Roadmap to Robust Identity and Access Management Elevating IAM from Responsive to Proactive From cases involving private retailers to government agencies, instances of organizations failing
Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems
Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems Brian McCarson Sr. Principal Engineer & Sr. System Architect, Internet of Things Group, Intel Corp Mac Devine
Computing & Telecommunications Services Monthly Report March 2015
March 215 Monthly Report Computing & Telecommunications Services Monthly Report March 215 CaTS Help Desk (937) 775-4827 1-888-775-4827 25 Library Annex [email protected] www.wright.edu/cats/ Last Modified
Seven Challenges of Embedded Software Development
Corporate Technology Seven Challenges of Embedded Software Development EC consultation meeting New Platforms addressing mixed criticalities Brussels, Feb. 3, 2012 Urs Gleim Siemens AG Corporate Technology
Managing Open Source Code Best Practices
Managing Open Source Code Best Practices September 24, 2008 Agenda Welcome and Introduction Eran Strod Open Source Best Practices Hal Hearst Questions & Answers Next Steps About Black Duck Software Accelerate
Privilege Gone Wild: The State of Privileged Account Management in 2015
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
Cloud 101. Mike Gangl, Caltech/JPL, [email protected] 2015 California Institute of Technology. Government sponsorship acknowledged
Cloud 101 Mike Gangl, Caltech/JPL, [email protected] 2015 California Institute of Technology. Government sponsorship acknowledged Outline What is cloud computing? Cloud service models Deployment
How Microsoft runs IT. Ludwig Wilhelm CIO Central & Eastern Europe Microsoft IT
How Microsoft runs IT Ludwig Wilhelm CIO Central & Eastern Europe Microsoft IT 2 Source: Accenture Cloudrise: Rewards & Risks at the Dawn of Cloud Computing, November 2010 3 Source: Accenture Cloudrise:
Storage Considerations for Database Archiving. Julie Lockner, Vice President Solix Technologies, Inc.
Storage Considerations for Database Archiving Julie Lockner, Vice President Solix Technologies, Inc. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies
Solving the Online File-Sharing Problem Replacing Rogue Tools with the Right Tools
White Paper Solving the Online File-Sharing Problem Replacing Rogue Tools with the Right Tools Introduction The modern workforce is on the hunt for tools that help them get stuff done. When the technology
CRYPTOGRAPHY AS A SERVICE
CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,
Utilizing SASED OneDrive Cloud Storage
Utilizing SASED OneDrive Cloud Storage Technology Department 5/29/15 The purpose of this document is to provide guidance on how to transfer and access SASED documents and folders on your SASED provided
EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
Market Maturity. Cloud Definitions
HRG Assessment: Cloud Computing Provider Perspective In the fall of 2009 Harvard Research Group (HRG) interviewed selected Cloud Computing companies including SaaS (software as a service), PaaS (platform
The IBM Solution Architecture for Energy and Utilities Framework
IBM Solution Architecture for Energy and Utilities Framework Accelerating Solutions for Smarter Utilities The IBM Solution Architecture for Energy and Utilities Framework Providing a foundation for solutions
Cost effective methods of test environment management. Prabhu Meruga Director - Solution Engineering 16 th July SCQAA Irvine, CA
Cost effective methods of test environment management Prabhu Meruga Director - Solution Engineering 16 th July SCQAA Irvine, CA 2013 Agenda Basic complexity Dynamic needs for test environments Traditional
Five keys to a more secure data environment
Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational
Solution White Paper Monetizing the Service Provider Cloud
Solution White Paper Monetizing the Service Provider Cloud Deliver the value-added cloud services that customers need while maximizing revenue Table of Contents 1 EXECUTIVE SUMMARY 2 EVOLUTION OF THE CLOUD
AWS Worldwide Public Sector
15 Minute Introduction to AWS and Q&A April 2015 Mark Fox Sr. Manager DoD Sales I love/hate relationship with the term cloud Now the IT norm Commercial Cloud should not be scary nor considered less secure
CS144R/244R Network Design Project on Software Defined Networking for Computing
CS144R/244R Network Design Project on Software Defined Networking for Computing (introduction and course overview) 9/2/2015 Instructor: Professor HT Kung Harvard Paulson School of Engineering and Applied
Professional Services for a Software-Defined Data Center
Professional Services for a Software-Defined Data Center Accelerating to a Software-Defined Data Center CIOs need people both internal staff and thirdparty providers who can help them think through their
